Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
94s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21/09/2024, 20:57
Static task
static1
Behavioral task
behavioral1
Sample
f098eb27d08c628eac5a815f286e848b_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f098eb27d08c628eac5a815f286e848b_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
f098eb27d08c628eac5a815f286e848b_JaffaCakes118.dll
-
Size
33KB
-
MD5
f098eb27d08c628eac5a815f286e848b
-
SHA1
f30fa6af13d191028267bdfaff36f336628e02e9
-
SHA256
3e93d4dc75def1bd5671eb6b2a17017351038b6bc6a9f6bcbb5f1b1d445b6efc
-
SHA512
200212ec2c0b8bf0b54c4a44f2ec792e7b20515f612f53c32e04307b19e79f3f6929246333155c52180528c85f50db0cc6b93de956eb755ab8c3be2a8a5f57f8
-
SSDEEP
768:cH1vfnnoOPQmIPWW75khYOj6eqOq6FR7Sue:cVvPn0mI575khYOjoSR7Sue
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3880 wrote to memory of 4268 3880 rundll32.exe 83 PID 3880 wrote to memory of 4268 3880 rundll32.exe 83 PID 3880 wrote to memory of 4268 3880 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f098eb27d08c628eac5a815f286e848b_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3880 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f098eb27d08c628eac5a815f286e848b_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:4268
-